Softlifting: Exploring Determinants of Attitude
暂无分享,去创建一个
Bandula Jayatilaka | Beena George | Tim Goles | Valrie Chambers | Linda M. Parsons | David S. Taylor | Valrie Chambers | T. Goles | Bandula Jayatilaka | Beena George | Rebecca Brune | Rebecca Brune
[1] T. Jones. Ethical Decision Making by Individuals in Organizations: An Issue-Contingent Model , 1991 .
[2] M. Snyder. Self-monitoring of expressive behavior. , 1974 .
[3] Richard A. Reid,et al. Software piracy: Is it related to level of moral judgment? , 1994 .
[4] Wynne W. Chin,et al. The Effects of Group Attitudes Toward Alternative GDSS Designs on the Decision‐making Performance of Computer‐Supported Groups* , 1994 .
[5] James Weber,et al. Adapting Kohlberg to Enhance the Assessment of Managers’ Moral Reasoning , 1991, Business Ethics Quarterly.
[6] Timothy Paul Cronan,et al. Modeling IT Ethics: A Study in Situational Ethics , 1998, MIS Q..
[7] H C Triandis,et al. Values, attitudes, and interpersonal behavior. , 1980, Nebraska Symposium on Motivation. Nebraska Symposium on Motivation.
[8] I. Ajzen,et al. Predicting dishonest actions using the theory of planned behavior , 1991 .
[9] Peter A. Todd,et al. Understanding Information Technology Usage: A Test of Competing Models , 1995, Inf. Syst. Res..
[10] Hsing Kenneth Cheng,et al. Toward a profile of student software piraters , 1996 .
[11] Fred D. Davis,et al. User Acceptance of Computer Technology: A Comparison of Two Theoretical Models , 1989 .
[12] K. R. Conner,et al. Software piracy: an analysis of protection strategies , 1991 .
[13] Mary Lippitt Nichols,et al. An investigation of the moral reasoning of managers , 1993 .
[14] I. Ajzen,et al. Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research , 1977 .
[15] Volker Schneider,et al. Business Software Alliance , 2009 .
[16] Icek Ajzen,et al. From Intentions to Actions: A Theory of Planned Behavior , 1985 .
[17] I. Ajzen. The theory of planned behavior , 1991 .
[18] Susan J. Harrington,et al. Why People Copy Software and Create Computer Viruses , 1989 .
[19] Chee-Sing Yap,et al. Testing an Ethical Decision-Making Theory: The Case of Softlifting , 1998, J. Manag. Inf. Syst..
[20] Cynthia K. Riemenschneider,et al. Executive Decisions About Adoption of Information Technology in Small Business: Theory and Empirical Tests , 1997, Inf. Syst. Res..
[21] Wynne W. Chin. The partial least squares approach for structural equation modeling. , 1998 .
[22] Andrew Dillon,et al. User acceptance of information technology , 2001 .
[23] Jane M. Howell,et al. Personal Computing: Toward a Conceptual Model of Utilization , 1991, MIS Q..
[24] I. Ajzen,et al. Understanding Attitudes and Predicting Social Behavior , 1980 .
[25] Sarah E. Hutchinson,et al. Computers and Information Systems , 1995 .
[26] Henk Elffers,et al. Exploring the limits of self-reports and reasoned action: An investigation of the psychology of tax evasion behavior. , 1988 .
[27] Vijay Mahajan,et al. Software Piracy: Estimation of Lost Sales and the Impact on Software Diffusion , 1995 .
[28] Wallace A. Wood,et al. Situational determinants of software piracy: An equity theory perspective , 1996 .
[29] Brian J. Reithel,et al. The Software Piracy Dilemma in Public Administration: A Survey of University Software Policy Enforcement , 1994 .
[30] M. Chang. Predicting Unethical Behavior: A Comparison of the Theory of Reasoned Action and the Theory of Planned Behavior , 1998 .
[31] Blair H. Sheppard,et al. The Theory of Reasoned Action: A Meta-Analysis of Past Research with Recommendations for Modifications and Future Research , 1988 .
[32] Fred D. Davis. Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..
[33] Richard L. Gorsuch,et al. Moral obligation and attitudes: Their relation to behavioral intentions. , 1983 .
[34] Dennis L. Dossett,et al. Attitude–behavior relations: A comparison of the Fishbein-Ajzen and the Bentler-Speckart models. , 1983 .
[35] Fred D. Davis. User Acceptance of Information Technology: System Characteristics, User Perceptions and Behavioral Impacts , 1993, Int. J. Man Mach. Stud..
[36] P. Simpson,et al. Softlifting: A model of motivating factors , 1994 .
[37] Wilbur J. Scott,et al. Tax evasion and mechanisms of social control: A comparison with grand and petty theft , 1982 .
[38] Jung P. Shim,et al. A Comparative Examination of Attitudes Toward Software Piracy Among Business Professors and Executives , 1993 .
[39] Hsing K. Cheng,et al. To Purchase or to Pirate Software: An Empirical Study , 1997, J. Manag. Inf. Syst..
[40] Michael Bommer,et al. A behavioral model of ethical and unethical decision making , 1987 .
[41] William R. Swinyard,et al. The morality of software piracy: A cross-cultural analysis , 1990 .
[42] Clifford M. Koen,et al. Software piracy and its legal implications , 1997, Inf. Manag..
[43] Jane M. Howell,et al. Influence of Experience on Personal Computer Utilization: Testing a Conceptual Model , 1994, J. Manag. Inf. Syst..